Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Do you have a file or folder on your PC that you always seem to access, yet you have to dig through countless folders or files in your organizational hierarchy to find it? Windows makes it simple to add a new shortcut to your PC. Here’s how you can make a shortcut to a file, folder, or program on your Windows computer.

Creating Your Shortcut

First, you should right-click anywhere on the desktop that isn’t already filled up by an icon or application. You can then select New from the menu that appears. Next, select Shortcut.

You’ll see a new dialog box that asks you to provide a program, file, or folder that you’d like to make a shortcut for. You can use the Browse button to find the file locally. If you have found the file, folder, or program you want to open, hit the OK button. You’ll see the file path populate in the dialog box. Click the Next button, and you’ll be asked to give your shortcut a name. Once you’re ready, click Finish. That’s all there is to it!

Of course, the option to move the folder or file to your desktop also exists, but we urge you to consider who else might require access to that file or folder. For example, if you have a file stored on your network, the last thing you want is to move it from your network to your desktop, thus preventing anyone else from accessing it in their time of need.

Plus, depending on your role within your organization, you might not have permissions to do such a thing in the first place. It’s better to just make a shortcut on your desktop and use that to access the file or folder. It’s cleaner and more effective.

There are many benefits to keeping your files and folders stored in a centralized location, including the ability to back up said data in the event of a disaster.

If you’re interested in doing so, you can also pin a specific file, folder, or program to the taskbar at the bottom of your screen, also allowing easy access. To do this, just click and drag the specified file, folder, or program to the taskbar. You can then click on it to access it whenever you need to.

We hope you find some value in this tip! Be sure to keep an eye on our blog for more just like this.

Manage and Create More than One Google Calendar
For Records and Information Management Month, Cons...
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Productivity Network Security Best Practices Tip of the Week Cloud Business Data Backup Managed IT Services Hackers Data Data Recovery IT Services communications Disaster Recovery IT Support Privacy VoIP Hosted Solutions Backup Mobile Devices Malware Software Innovation Cybersecurity Small Business Efficiency Business Continuity Saving Money Phishing Computer Hardware Internet Email Cloud Computing Outsourced IT Business Management BDR Smartphones Microsoft Collaboration Productivity Automation Information Technology Internet of Things IT Support Ransomware User Tips Compliance Quick Tips Smartphone Workplace Strategy Upgrade Server Users Meetings Mobile Device Management Network Managed IT services Mobility Risk Management Communication Covid-19 Budget Workplace Tips Managed IT Artificial Intelligence Google Save Money Remote Training Wi-Fi Managed Service Provider Networking Mobile Device BYOD Avoiding Downtime Android Wireless Document Management Spam Windows 7 Employee-Employer Relationship Passwords Remote Workers Human Resources Gadgets Instant Messaging Hosted Solution VPN Cost Management Video Conferencing Computers Microsoft Office Managed Service Firewall Remote Computing Router Project Management Time Management Content Filtering Virtual Private Network Chrome Information MSP Data Management Windows 10 Password Printing Remote Work History Personal Information Machine Learning Voice over Internet Protocol Managed Services Monitoring IT Service Employer-Employee Relationship Devices Government Social Media Paperless Office Manufacturing Telephone Systems Value Backup and Disaster Recovery Printers Mobile Office Hybrid Cloud Software as a Service Hacker Conferencing End of Support Saving Time Data Breach Business Technology Printer Data Security Encryption Hard Drives Maintenance Help Desk Audit Marketing Telephony Recovery Redundancy Solid State Drive Office Wireless Internet Big Data Tech Term Mobile Laptop Computing Automobile Nanotechnology Payment Cards Regulations Compliance Content Filter Antivirus Vendor Management Data Loss Data Protection Videoconferencing Payroll RMM Bandwidth Administration Voiceover Internet Protocol Leadership Gamification Professional Services Workers Wireless Technology Cost Telephone Blockchain Transportation Analysis Virtual Assistant Going Paperless Holiday PDF AI Streaming Education Cleaning Windows 11 Chromebook Work/Life Balance Colocation Proactive IT Private Cloud Business Telephone How To Proactive The Internet of Things Hacking Travel Money Mobile Computing e-waste Applications Fiber Optics Outsourcing Phone System Lifestyle Regulations Going Green Azure Outsource IT Alexa for Business Management Entertainment Samsung Black Market Commerce Troubleshooting Application Smart Tech Vendor Office 365 Spyware Current Events Upgrades Smartwatch Computer Repair Bitcoin Microsoft Outlook Students Utility Computing Disaster Cybersecurty Save Time Smart Technology Flexibility Business Intelligence Windows Server 2008 IoT SMB Active Directory iPhone Break/Fix Window 10 Financial Technology HIPAA File Sharing Development Workstations Customer Service Battery Two-factor Authentication Downtime Browser Cabling Connectivity Apple Windows 10 Cybercrime Finance Unified Communications Electronic Medical Records Dark Web WPA3 Facebook App Employees Remote Working Virtualization Operating System Windows Server Online Storage Inventory Management Company Culture intranet Files Social Engineering Copier Wasting Money Evernote E-Commerce PCI DSS Streaming Media User Error Advertising Infrastructure Remote Monitoring File Storage Word Update SaaS Managed IT Service Copiers Shadow IT Vulnerability Regulation Hiring/Firing Windows Legal OneNote Customer Relationship Management Employer/Employee Relationships Amazon Scams Workplace Strategies Camera Edge Touchscreen ROI Hosted Desktop Financial Managing Stress Emergency Credit Cards Social Unsupported Software Telework Hard Drive Worker Commute Scam Windows Ink Device Security Humor WiFi Data Storage Sabotage Database Access Control USB Books Sales Virus iOS Sync Benchmarks Search eCommerce SSD Twitter Experience Cortana IT solutions Virtual Desktop Patch Management Digital Signage Root Cause Analysis Employee Managed Services Provider Projects Google Docs Ciminal Best Practice IT Management Windows Server 2008 R2 Smart Devices Bring Your Own Device FAQ Audits Google Maps How To Unified Threat Management Screen Mirroring PC Biometrics Memory Admin Virtual Reality Retail Updates Settings Computer Forensics Hyperlink Identities Windows 10s Outlook Authentication App store Augmented Reality Google Drive Facebook Privacy Policy Print Management Microsoft Excel Apps Computer Tips Worker Adobe Wireless Charging Relocation Solutions Supply Chain Cast Websites Law Enforcement Computer Fan Tablets Microsoft Word Business Strategy YouTube Alert Innovations Remote Management Gmail Wasting Time Music Legislation Hard Disk Drive Shortcut Internet Service Provider Windows 8.1 Mobile Security Video Games Procedure Healthcare Text Messaging CRM WannaCry Myths Computer Accessories Tech Support Consultant Server Maintenance Inventory Keyboard Shortcuts Gifts Data Theft Reputation NFL Scalability Holidays Telephone System PowerPoint Accessory Analytics Comparison Language Excel Robot Voice Identity Health Television CrashOverride 5G Organization Display Storage Office Tips Emails IT Solutions Keyboard Point of Sale Licensing Threats Environment Testing Fraud HBO Investment Communitications Safety Computer Care Data Privacy Identity Theft eWaste Internet Exlporer OneDrive Reviews Print Peripheral Specifications HaaS Security Cameras Processor Workstation Medical IT Miscellaneous Google Assistant Co-Managed Services Politics Charger Sports IT budget Webinar 2FA WIndows Server 2008 Micrsosoft Net Neutrality Work